Individual identity is a term explaining how people express themselves via social media. Whether it’s through their user name, images displayed, or customized profile, individuals are entitled to express themselves in whichever way they like. However, this freedom is not always such a good thing as it gives people to opportunity to pretend to be someone they are not. As our online environment becomes open and sharing, the dangers of social media become more prominent, threatening our safety and individuality.
Nowadays, it is often that people gain access to other’s credit cards after making an online purchase. By obtaining someone’s credit card details means they are able to spend thousands of dollars in purchases, leaving the credit card holder in a lot of debt for things they didn’t even buy. Another common form of identity theft occurs on social networking websites such as Facebook and Myspace. Users can create fake accounts, pretending to be somebody else either to conceal their own identity or humiliate another person. By putting up pictures of the person they are pretending to be and by adding their friends, users are lead to believe that this person is who they say they are. Online news site pc1news.com, is flooded with comments stating that they need help to get their fake Facebook profile deleted. With pleas for help, one lady even stated that it tearing her family apart, while another said that someone is sending obscene messages to a lady using her husband’s name.
This YouTube video explains how easy identity theft really is. Personal information can be accessed with the click of a button:
According to Paul Bocij, a female at Iowa State University in 2001 hacked into her friend’s email account and was able to impersonate them; turning down a $200,000-a-year job they had been offered. She had been able to access the account because of her personal knowledge of the friend, therefore able to hack his passwords. Identity thieves rely on simple tactics to gather their information and these are called phishing and pharming. Phishing involves luring victims to a fake website using techniques such as sending out fake emails which seem like they are from a genuine company. These emails contain a web address for the recipients to access, offering them some sort of reward or benefit, or even pretending that there is a potential problem with, for example, their bank account. Pharming, on the other hand, redirects ones web browser to a fake website which is done via poisoning of local domain servers or malware such as Trojans and browser add-ons. Users are generally unaware that they are being redirected to another website as the address they typed in can remain visible.
Social media makes it difficult for us to have our own individual identity. Everything you post on the internet can be seen by almost anyone, therefore it is essential that you think before you post something on any website and to anyone. On social networking websites, ensure that your profile is set to private allowing only your friends to view your information. No one can be trusted on the Internet. It’s a dog eat dog world and everyone is hungry to make themselves look better and please their own desires, even if that means pretending to be someone else. Be mindful about the types of people you are talking to as it is very easy for people to put on an act and convince you of who they are but remember they are hidden behind a computer screen and that face you imagine to be theirs may be the complete opposite.
Reference List



